Manage real-time change detection for global IT environments

Qualys released its highly scalable and centralized File Integrity Monitoring (FIM) Cloud App, which logs and centrally tracks file change events across global IT systems and a variety of enterprise operating systems to provide customers a way to achieve centralized cloud-based visibility of activity resulting from normal patching and administrative tasks, change control exceptions or violations, or malicious activity — then report on that system activity as part of compliance mandates.

End-to-end visibility for public cloud platforms

Ixia has further extended the CloudLens Visibility Platform to include support for Microsoft Azure, Google Cloud Platform, IBM Bluemix, and Alibaba Cloud, in addition to the existing support for AWS, and for both Windows and Linux. CloudLens was designed from the ground up to retain the benefits of the cloud – elastic scale, flexibility, and agility, while enabling security, analytics, and forensics tools to acquire the needed data, whether the tool is in a private data center or public cloud.

Twistlock releases Twistlock 2.2 with Incident Explorer

The latest release of Twistlock focuses on advanced threat analytics and prevention and includes several machine learning driven layers such as a Cloud Native Network Firewall and Incident Explorer. In addition, the release provides runtime defense down to the host OS and delivers comprehensive compliance monitoring and enforcement for Kubernetes.

Palo Alto Networks announced its new cloud-based Logging Service, which allows customers to amass large amounts of their own data from the Palo Alto Networks Next-Generation Security Platform. Logging Service provides a centralized and scalable logging infrastructure without operational overhead, allowing customers to collect log data without local compute and storage limitations.

XT Access Manager: Privileged account management and automation

Xton Technologies released the XT Access Manager (XTAM),a PAM platform that combines a secure identity vault, session management with recording and automated password resets. Customers also can take advantage of features including delegated script execution, discovery of privileged accounts and extensive reporting for network computers and IoT devices.

DataKeep is a data-centric security software solution comprised of a management console and encryption agents. DataKeep enables accelerated encryption at scale, protecting data from the source of creation in the OS all the way through, and including, data storage, regardless of whether data resides on-premise, in the cloud or a virtual environment.

Threatcare builds AI-based virtual cybersecurity professional

Similar to a Siri or Alexa for cybersecurity, Violet has machine learning and Neuro-Linguistic Programming (NLP) capabilities and can answer questions and take commands from security analysts who are looking to find and fix urgent threats in their networks. Violet is the world’s first virtual cybersecurity professional that aims to replace multiple team members, offering continuous reconnaissance to give an attacker’s view of an organization.